Public Sector

We've had the pleasure of working with UK and overseas central and local government departments, including Healthcare (NHS and Foundation Trusts), Defence, Education (Universities and colleges), many of the main Civil Service departments, Emergency Services; also public-owned corporations including the BBC, Bank of England, Ordnance Survey, and regulatory bodies such as Ofgem.

We are registered on Crown Commercial Service’s (CCS) Dynamic Purchasing System (RM6219 Training and Learning) and also with numerous tender portals such as Ariba, Coupa and Delta E-Sourcing.

Read more...

Graduate Training Schemes

Framework Training has a strong track record of providing a solid introduction into the working world for technical graduates across myriad industries. We provide the opportunity to learn and gain valuable hands-on experience in a supportive, friendly and sociable training environment.

Attract & retain the brightest new starters

We know it is vital for our clients to invest in the future of their talented grads; not only to provide them with high-quality, professional training essential for their roles, but to embed them within the organisation’s culture and guide them on the right path to a successful career.

After all, your new hires could well be the next leaders and their creative ideas and unique insights are invaluable to your business.

Read more ...

Learning & Development

Our unique portfolio of high-quality technical courses and training programmes are industry-respected. They’re carefully designed so that delegates can seamlessly apply what they’ve learnt back in the workplace. Our team of domain experts, trainers, and support teams know our field — and all things tech — inside out, and we work hard to keep ourselves up to speed with the latest innovations. 

We’re proud to develop and deliver innovative learning solutions that actually work and make a tangible difference to your people and your business, driving through positive lasting change. Our training courses and programmes are human-centred. Everything we do is underpinned by our commitment to continuous improvement and learning and generally making things much better.

Read more...

Corporate & Volume Pricing

Whether you are looking to book multiple places on public scheduled courses (attended remotely or in our training centres in London) or planning private courses for a team within your organisation, we will be happy to discuss preferential pricing which maximise your staff education budget.

Enquire today about:

  • Training programme pricing models  

  • Multi-course voucher schemes

Read more...

Custom Learning Paths

We understand that your team training needs don't always fit into a "one size fits all" mould, and we're very happy to explore ways in which we can tailor a bespoke learning path to fit your learning needs.

Find out about how we can customise everything from short overviews, intensive workshops, and wider training programmes that give you coverage of the most relevant topics based on what your staff need to excel in their roles.

Read more...

What’s the Big Issue with Google's OAuth Flaw?

You may have seen a flurry of articles talking about Google and OAuth and wondered what is going on. What is the big issue? How does it work? And should I be worried? In this blog we will take a look at all of these questions and help you identify if you are at risk.

January 25th, 2025

What is OAuth?

Let’s start off looking at what OAuth actually is – you'd be forgiven for assuming the ‘Auth’ part relates authentication but that's not really the case. "OAuth" actually stands for “Open Authorization”. This is an important distinction as the protocol is about authorization not authentication.

What is the difference, you may well ask? Well essentially:

  • Authentication is about proving who you are; that is, it is sued to verify a user’s identity. This might be done via a username and a password, pin or other information.

  • Authorization on the hand relates to what you are allowed to do or use; that is what permissions you have or do not have to access different resources.

For example, if you have a website where users might have to log in to use the site; this would call on the verification part of the security system. However, once logged in, some users may only have access to certain aspects of the web site while other users may have access to a wider set of features or functions – this relates to what they are authorized to use. As a concrete example, a standard Microsoft 365 user may not have access to controls and dashboards that an administrator would have.

Back to OAuth! Strictly speaking, there are two versions of OAuth - version 2.0 replaced 1.0 way back in 2012 and is now the de facto industry standard for online authorization; from this point on when we mention OAuth we are referring to OAuth 2.0.

The aim of OAuth is to allow a user using one web site or application, to access resources hosted by another web site or application, based on their authorization. To do this OAuth uses Access Tokens; an Access Token is a bit of data that represents an authorization on behalf of a user to access a resource. Here resource could be anything including a web page, a web site, functionality on a web page, a web application, a mobile application, an image, some data within an application or web page, Smart TV, desktop application etc.

This idea of resource is one of the key components within the OAuth specification. There are several such components including:

  • Resource Owner: The owner of the resource being protected; such an owner can grant access to the resource.

  • Client: The system that is requesting access to the protected resource. To access the resource the Client will need to obtain an Access Token.

  • Authorization Server: The server that receives requests from the Client for an Access Token. To obtain an Access Token the Client will need to Authenticate.

  • Resource Server: The server that provides access to the resource on receipt of a valid Access Token.

There is much more to OAuth 2 than just this, but this provides the core concepts relevant to this blog.

How Does OAuth Work?

The following are the simplified basic steps within OAuth:

  1. An application / web site requests access to some restricted resource.

  2. A check is made by the owner of the restricted resource to an Authorization server to check to see if they are known and whether they can access the resource. To do this it supplies the client information and an endpoint URI to send the Access Token to.

  3. The Authorization server verifies (authenticates) the client to check that they are who they say they are.

  4. The Authorization Server sends the Access Token back to the application confirming or denying the Client.

  5. Now in possession of the Access Token the application / web site allows the client access to the restricted resource from the Resource Server.

Photo of Google's company sign outside their West Java Drive office locationSo what is the big issue?

The recent problem with Google’s “Sign in with Google" system is related to domain names. For example, if my application checks with Google that Tom from Framework Training is in fact Tom from Framework Training then Google will reply back with some information confirming their domain and their email address.

This is all well and good for Framework Training as they are a well-established organisation and absolutely still in business!

However, what happens if we are talking about some small start-up company called ‘zzzoft’ (please note, as far as we could see there is no such company – we are just using this made up name as an example). The company employees a few employees and uses Googles OAuth system to allow them to gain access to various systems such as HR systems, client accounts, DM system such as Slack, Zoom etc. However, it turns out that no one is interested in zzzsot’s whizzy new app and after a year and a bit the company goes bankrupt and folds. However, its shiny new domain zzzsoft.com is still around. It can now be bought by someone else; indeed, there are very, very many failed startup domains available for purchase from many different organisations.

So, what you may ask? Well, if I now buy zzzsoft.com I can use it to fool Google into thinking that I am zzzsoft and when another application tries to very a user with google using OAuth I will be asked to verify a zzzsoft user. Which once done gives me access to that user’s login on some system, such as Slack or Zoom or a HR system etc.

This is because the authorization and authentication process is based on the domain and their email. Of course, the requesting application could require additional security checks, but here’s the thing, many don't many just rely on the presence of the access token confirming the domain and the email. For example, they might say that anything from zzzsoft.com domain can log into this system and the email joe@zzzsoft.com is used to allow access to Joe’s data within the system.

Does it have anything to do with me?

This is a trickier question to answer than it may seem! If you have ever worked for a failed start-up company, then possibly yes. If you have worked for a company that has changed its name and potentially its domain and then not re-registered that name, then yes.

What can be done?

In essence this is a fix that only Google can resolve; there is little that downstream applications can do if Google provides an appropriate Access Token to them. Some fixes have been proposed and as of the end of 2024 Google has been officially looking into this issue (although it was originally reported to Google back at the end of September 2024 and initially Google rejected it as an issue).

Summary

In summary, this seems like a fundamental issue for Google and hopefully they will now react quickly to this problem. Whether you are directly affected by it will depend on whether you have been involved with an organisation that no longer registers their domain themselves and have previously used it as part of an OAuth system. If you are an organisation relying on Googles OAuth systems; then care may well be the watch word.


Would you like to know more?

If you want your staff to have greater understanding of IT security, we have a great range of courses ranging from Cyber Awareness for non-technical staff, through to Web Application Security with OWASP, and DevSecOps

Share this post on:

We would love to hear from you

Get in touch

or call us on +44 (0) 20 3137 3920